Information Security

ALSO CALLED:
InfosecurityDEFINITION: COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive
Definition continues below.

CASE STUDY:
Chances are that you need to do work with outside parties, but you're concerned that doing so puts your content at risk. Find out what Young New Yorkers, a non-profit organization, did to ensure that they could maintain their collaborative efforts without compromising content security.

EZINE:
In this week's Computer Weekly, we talk to global charity Save the Children to find out how technology is helping to transform its work. We go behind the scenes at the UK's most secretive court as it discusses bulk data surveillance. And we analyse the often contradictory experiences of firms implementing SAP's Hana platform. Read the issue now.

EZINE:
In this week's Computer Weekly, we find out how HS2, the UK's planned high-speed railway, is developing its IT from scratch and having to predict the future. We hear from DevOps experts who try to bust some of the myths around continuous software delivery. And our latest buyer's guide analyses graph databases. Read the issue now.

EZINE:
In this week's Computer Weekly, we talk to the hunters – a new breed of security expert that proactively hunts down cyber attackers. We visit Silicon Valley to meet some of the up-and-coming startups in data analytics. And we hear from IT leaders about the people, process and cultural aspects of managing digital transformation. Read the issue now.

EZINE:
In this week's Computer Weekly, we find out how a temporary IT set-up based in a portacabin is supporting the UK's largest critical infrastructure project. Our latest buyer's guide looks at converged infrastructure products. And we analyse research showing data protection topping the list of UK security priorities. Read the issue now.

WEBCAST:
This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.

EBOOK:
DDoS attack prevention begins with understanding the nature of the latest sophisticated attacks. In this guide, leading security pros explain the mechanics of DDoS, the nature of the newest mega-attacks, and provide concrete, actionable guidance to make your systems as strong as possible.

EBOOK:
Vendors are now turning to threat intelligence services to combat unseen threats. This guide will introduce you to threat intelligence services and detail how each services compares to one another. Learn how to best choose a service that can fight the specific attacks which afflict your network and who can scale as your organization grows.

EGUIDE:
A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.

EZINE:
In this week's Computer Weekly, we find out how software is helping to maintain safety in high-risk sectors such as oil and gas, aerospace and healthcare. We offer six tips from CIOs for innovation with data. And we examine the continuing threat to businesses from denial of service cyber attacks. Read the issue now.

WHITE PAPER:
Discover the top 5 questions (and answers) you need to consider when crafting your cloud security strategy. The sad truth is there is no silver bullet to keep your data safe, but there are simple steps to keep hackers out. View now to find out what they are.

EZINE:
In this week's Computer Weekly, after hackers took remote control of a Jeep Cherokee, we assess the security concerns for internet-connected cars. With the growth of digital banking, is there a need for high-street branches anymore? And we examine whether email overload is hindering the UK's economic productivity. Read the issue now.

RESOURCE:
Does your list of security vulnerabilities seem overwhelming? Visualisation in VM can be an essential tool in making critical issues apparent. Security Visualisation serves as a guideline of how to generate a visual representation of a dataset. Download this guide to get expert advice on how to generate a security visualization plan.

WHITE PAPER:
Security information and event management (SIEM) tools offer more than just security. In fact, many organizations overlook some of the most useful aspects of SIEM technology, including fraud prevention and operations management. In this expert resource, discover the value of SIEM tools for four different audiences.

INFORMATION SECURITY DEFINITION (continued): COBIT (Control Objectives for Information and Related Technology) is an international open standard that defines requirements for the control and security of sensitive data and provides a reference framework. COBIT, which provides a reference framework, was introduced in the 1990s by the IT Governance Institute. Learn more about managing compliance at SearchCompliance.com. COBIT consists of an executive summary, management guidelines, framework, control objectives, implementation toolset and audit guidelines. Extensive support is provided, including a list of critical success factors for measuring security program effectiveness and benchmark s for auditing purposes. COBIT has been revised several times since inception and upgrades are published at regular intervals.Information Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines